Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14799: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in neeraj_slit Brevo – Email, SMS, Web Push, Chat, and more.

0
Medium
VulnerabilityCVE-2025-14799cvecve-2025-14799cwe-843
Published: Wed Feb 18 2026 (02/18/2026, 11:26:03 UTC)
Source: CVE Database V5
Vendor/Project: neeraj_slit
Product: Brevo – Email, SMS, Web Push, Chat, and more.

Description

The Brevo - Email, SMS, Web Push, Chat, and more. plugin for WordPress is vulnerable to authorization bypass due to type juggling in all versions up to, and including, 3.3.0. This is due to the use of loose comparison (==) instead of strict comparison (===) when validating the installation ID in the `/wp-json/mailin/v1/mailin_disconnect` REST API endpoint. This makes it possible for unauthenticated attackers to disconnect the Brevo integration, delete the API key, remove all subscription forms, and reset plugin settings by sending a boolean `true` value for the `id` parameter, which bypasses the authorization check through PHP type juggling.

AI-Powered Analysis

AILast updated: 02/18/2026, 11:44:50 UTC

Technical Analysis

CVE-2025-14799 is a vulnerability classified under CWE-843 (Access of Resource Using Incompatible Type, or Type Confusion) found in the Brevo – Email, SMS, Web Push, Chat, and more. WordPress plugin developed by neeraj_slit. The flaw is due to the use of PHP loose comparison (==) instead of strict comparison (===) when validating the installation ID parameter in the REST API endpoint /wp-json/mailin/v1/mailin_disconnect. Because PHP's loose comparison allows different data types to be considered equal (e.g., boolean true == string 'somevalue'), an attacker can bypass authorization checks by sending a boolean true value for the 'id' parameter. This bypass enables unauthenticated attackers to forcibly disconnect the Brevo integration, delete the API key, remove all subscription forms, and reset plugin settings. The vulnerability affects all plugin versions up to and including 3.3.0. The CVSS 3.1 base score is 6.5 (medium), reflecting network attack vector, no privileges required, no user interaction, and impact on integrity and availability but not confidentiality. No known exploits have been reported yet. The vulnerability could lead to denial of service of Brevo-related communication features and loss of configuration, which may disrupt marketing and customer engagement workflows. The root cause is improper type handling in authorization logic, a common PHP security pitfall.

Potential Impact

For European organizations using the Brevo WordPress plugin, this vulnerability could result in unauthorized disruption of critical communication channels such as email, SMS, web push notifications, and chat services. The ability for unauthenticated attackers to reset plugin settings and delete API keys could lead to service outages, loss of subscriber data, and interruption of marketing campaigns. This may cause reputational damage, reduced customer engagement, and potential regulatory compliance issues, especially under GDPR if subscriber data is affected or lost. Organizations relying heavily on Brevo for customer communications or transactional messaging could experience operational impacts. Additionally, attackers could leverage the disruption to conduct further attacks or social engineering by exploiting the downtime or altered communication flows. The vulnerability’s network accessibility and lack of authentication requirement increase the risk of widespread exploitation if not mitigated promptly.

Mitigation Recommendations

1. Upgrade the Brevo plugin to a version where this vulnerability is patched once available. Monitor the vendor's official channels for updates. 2. As an immediate workaround, restrict access to the /wp-json/mailin/v1/mailin_disconnect REST API endpoint using web application firewall (WAF) rules or server-level access controls to allow only trusted IP addresses or authenticated users. 3. Implement strict input validation and type checking in any custom code interacting with the plugin or its API endpoints. 4. Regularly back up plugin settings and subscriber data to enable quick restoration in case of unauthorized resets. 5. Monitor WordPress logs and API access logs for unusual requests to the vulnerable endpoint, especially those containing boolean or unexpected parameter values. 6. Employ security plugins that can detect and block suspicious REST API calls. 7. Educate site administrators about the risks of using plugins with known vulnerabilities and encourage timely patching and security hygiene. 8. Consider isolating critical communication plugins in a staging environment before deployment to production to detect such issues early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-16T19:50:41.434Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995a2d880d747be206547e8

Added to database: 2/18/2026, 11:30:32 AM

Last enriched: 2/18/2026, 11:44:50 AM

Last updated: 2/21/2026, 2:16:50 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats